<?xml version="1.0" encoding="UTF-8"?>
<rss
    version="2.0"
    xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link
            type="application/rss+xml"
            href="https://mrityunjaysingh.com/feed/products"
            rel="self"
        />
        <title><![CDATA[Products feed]]></title>
        <link><![CDATA[https://mrityunjaysingh.com/feed/products]]></link>
                <description><![CDATA[Latest posts from Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></description>
        <language>en_US</language>
        <pubDate>2025-11-13T13:07:20+05:30</pubDate>

                    <item>
                <title><![CDATA[Fast DNS Enumeration &amp; Resolution for Reconnaissance]]></title>
                <link>https://mrityunjaysingh.com/products/fast-dns-enumeration-resolution-for-reconnaissance</link>
                <description><![CDATA[<p>Master <strong>Dnsx</strong>, ProjectDiscovery’s high-performance DNS toolkit designed for massive subdomain resolution and DNS-based reconnaissance. This practical course teaches you how to perform fast, accurate DNS lookups, identify active hosts, and integrate Dnsx seamlessly with tools like Amass, Subfinder, and HTTPX. Ideal for ethical hackers, bug bounty hunters, and penetration testers focused on large-scale infrastructure discovery.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/fast-dns-enumeration-resolution-for-reconnaissance</guid>
                <pubDate>Thu, 13 Nov 2025 13:07:20 +0530</pubDate>
                <enclosure
                    type="image/webp"
                    url="http://mrityunjaysingh.com/storage/dns-icon-white-background-isolated-vector-illustration-cyber-security-concept-123447-2993-1200x900.webp"
                    length="35146"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[Naabu – Fast Port Scanning for Network Reconnaissance]]></title>
                <link>https://mrityunjaysingh.com/products/naabu-fast-port-scanning-for-network-reconnaissance</link>
                <description><![CDATA[<p>Learn <strong>Naabu</strong>, ProjectDiscovery’s ultra-fast port scanning tool built for large-scale reconnaissance and security assessments. This course teaches you how to discover live hosts, detect open ports across massive IP ranges, and integrate Naabu into automated pipelines with tools like Nmap, HTTPX, and Nuclei. Perfect for ethical hackers, bug bounty hunters, and network defenders who need high-speed, accurate network scanning with precision and safety.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/naabu-fast-port-scanning-for-network-reconnaissance</guid>
                <pubDate>Thu, 13 Nov 2025 12:59:09 +0530</pubDate>
                <enclosure
                    type="image/png"
                    url="http://mrityunjaysingh.com/storage/1-bb8jil2dzwcimjc4cfepba.png"
                    length="1147631"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[Nuclei – Fast, Template-Based Vulnerability Scanning &amp; Automation]]></title>
                <link>https://mrityunjaysingh.com/products/nuclei-fast-template-based-vulnerability-scanning-automation</link>
                <description><![CDATA[<p>Master <strong>Nuclei</strong> from ProjectDiscovery — a fast, flexible, template-driven scanner for automated vulnerability detection, misconfiguration checks, and reconnaissance at scale. This hands-on course shows you how to write, use, and tune Nuclei templates, integrate Nuclei into CI/CD and triage pipelines, and build reliable automation for continuous security testing. Ideal for bug bounty hunters, red teams, security engineers, and DevSecOps teams.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/nuclei-fast-template-based-vulnerability-scanning-automation</guid>
                <pubDate>Thu, 13 Nov 2025 12:51:43 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/hqdefault-1.jpg"
                    length="25021"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[HTTPX – High-Performance HTTP Probing &amp; Service Discovery]]></title>
                <link>https://mrityunjaysingh.com/products/httpx-high-performance-http-probing-service-discovery</link>
                <description><![CDATA[<p>Learn <strong>HTTPX</strong>, the fast, multi-purpose HTTP probing tool from ProjectDiscovery used for service discovery, large-scale host probing, and endpoint reconnaissance. This practical, hands-on course teaches you how to probe millions of hosts reliably, interpret HTTP responses, chain probes with other tools, and build scalable recon pipelines for bug bounties, red teams, and vulnerability scanning. Emphasis on ethical usage, rate-limiting, and safe lab practice.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/httpx-high-performance-http-probing-service-discovery</guid>
                <pubDate>Thu, 13 Nov 2025 12:42:10 +0530</pubDate>
                <enclosure
                    type="image/png"
                    url="http://mrityunjaysingh.com/storage/1-ontf0cal28mpqvhhrmy24g.png"
                    length="1367051"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[XSStrike – Advanced Cross-Site Scripting (XSS) Discovery &amp; Exploitation]]></title>
                <link>https://mrityunjaysingh.com/products/xsstrike-advanced-cross-site-scripting-xss-discovery-exploitation</link>
                <description><![CDATA[<p>Master <strong>XSStrike</strong>, a powerful XSS detection and exploitation framework that automates payload generation, fuzzing, and intelligent validation to find client-side vulnerabilities. This hands-on course teaches you how XSS works (reflected, stored, DOM), how to use XSStrike effectively alongside manual techniques, and how to harden web applications against injection attacks. Strong emphasis on ethical testing, safe labs, and responsible disclosure.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/xsstrike-advanced-cross-site-scripting-xss-discovery-exploitation</guid>
                <pubDate>Thu, 13 Nov 2025 12:37:15 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/sddefault.jpg"
                    length="33276"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[WPScan – WordPress Vulnerability Scanning &amp; Hardening]]></title>
                <link>https://mrityunjaysingh.com/products/wpscan-wordpress-vulnerability-scanning-hardening</link>
                <description><![CDATA[<p>Master <strong>WPScan</strong>, the specialist WordPress security scanner used to detect vulnerable core versions, plugins, themes, weak credentials, and common misconfigurations. This hands-on course shows you how to safely assess WordPress sites, triage findings, and implement practical hardening and remediation steps to protect sites from real-world attacks. Strong emphasis on ethical, permissioned testing and safe reporting.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/wpscan-wordpress-vulnerability-scanning-hardening</guid>
                <pubDate>Thu, 13 Nov 2025 12:32:18 +0530</pubDate>
                <enclosure
                    type="image/webp"
                    url="http://mrityunjaysingh.com/storage/checking-the-password-strength-of-wordpress-users-with-wpscan.webp"
                    length="51404"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[TheHarvester – OSINT Email &amp; Hostname Harvesting for Recon]]></title>
                <link>https://mrityunjaysingh.com/products/theharvester-osint-email-hostname-harvesting-for-recon</link>
                <description><![CDATA[<p>Learn <strong>TheHarvester</strong>, a focused OSINT tool for gathering emails, hostnames, subdomains, and related metadata from public sources. This hands-on course teaches you how to efficiently collect and validate external footprint data, combine results with other recon tools, and convert raw harvested data into prioritized intelligence for assessments, bug bounties, and incident response. Strong emphasis on ethical, permissioned reconnaissance and responsible use of gathered data.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/theharvester-osint-email-hostname-harvesting-for-recon</guid>
                <pubDate>Thu, 13 Nov 2025 12:23:45 +0530</pubDate>
                <enclosure
                    type="image/webp"
                    url="http://mrityunjaysingh.com/storage/http-dev-to-uploadss3amazonawscom-i-fz0o8i5df06fkomd4jfj.webp"
                    length="12860"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[Dirsearch – Web Directory &amp; File Discovery Mastery]]></title>
                <link>https://mrityunjaysingh.com/products/dirsearch-web-directory-file-discovery-mastery</link>
                <description><![CDATA[<p>Master <strong>Dirsearch</strong>, the fast and flexible command-line tool for discovering hidden directories, files, and endpoints on web servers. This hands-on course shows you how to run efficient brute-force and wordlist-based scans, reduce noise and false positives, and turn raw findings into prioritized remediation actions. Ideal for web app testers, bug bounty hunters, and defenders who want to find exposed content before attackers do. Ethical, permissioned testing is emphasized throughout.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/dirsearch-web-directory-file-discovery-mastery</guid>
                <pubDate>Thu, 13 Nov 2025 12:19:03 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/1-97hovxo03bhvprquzbmuhq.jpg"
                    length="128722"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[Nikto – Web Server Scanning &amp; Vulnerability Discovery]]></title>
                <link>https://mrityunjaysingh.com/products/nikto-web-server-scanning-vulnerability-discovery</link>
                <description><![CDATA[<p>Learn <strong>Nikto</strong>, the fast and reliable open-source web server scanner used to find outdated servers, misconfigurations, and common web vulnerabilities. This practical course teaches you how to run effective server scans, interpret findings, integrate Nikto into recon pipelines, and prioritize fixes — with an emphasis on ethical, permissioned testing and producing actionable reports for defenders.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/nikto-web-server-scanning-vulnerability-discovery</guid>
                <pubDate>Thu, 13 Nov 2025 12:15:39 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/images-3-7.jpg"
                    length="10884"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[Recon-ng – Modular Web Reconnaissance &amp; OSINT Automation]]></title>
                <link>https://mrityunjaysingh.com/products/recon-ng-modular-web-reconnaissance-osint-automation</link>
                <description><![CDATA[<p>Master <strong>Recon-ng</strong>, the powerful modular web reconnaissance framework for OSINT and automated information gathering. This hands-on course teaches you how to build repeatable recon workflows, use Recon-ng’s modules to gather and enrich data (WHOIS, DNS, social, breach data, etc.), pivot between sources, and turn findings into actionable intelligence for assessments and bug bounty engagements. Course emphasizes ethical, permissioned use and responsible disclosure.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/recon-ng-modular-web-reconnaissance-osint-automation</guid>
                <pubDate>Thu, 13 Nov 2025 12:10:15 +0530</pubDate>
                <enclosure
                    type="image/png"
                    url="http://mrityunjaysingh.com/storage/0-bjq1agxwau7xlmr5.png"
                    length="1032944"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[Sublist3r – Fast Subdomain Enumeration &amp; Recon Fundamentals]]></title>
                <link>https://mrityunjaysingh.com/products/sublist3r-fast-subdomain-enumeration-recon-fundamentals</link>
                <description><![CDATA[<p>Learn to use <strong>Sublist3r</strong>, a lightweight and efficient Python tool for discovering subdomains through passive enumeration and public sources. This course teaches practical techniques for rapid asset discovery, combining Sublist3r with other recon tools and enrichment workflows so you can build reliable attack-surface inventories for bug bounties, red teams, and security engagements. Emphasis on ethical, permissioned use and converting raw recon into actionable intelligence.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/sublist3r-fast-subdomain-enumeration-recon-fundamentals</guid>
                <pubDate>Thu, 13 Nov 2025 12:00:14 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/0-3fpdojlfpfeypiau.jpg"
                    length="204584"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[Amass – Advanced Attack Surface Mapping &amp; DNS Reconnaissance]]></title>
                <link>https://mrityunjaysingh.com/products/amass-advanced-attack-surface-mapping-dns-reconnaissance</link>
                <description><![CDATA[<p>Master <strong>OWASP Amass</strong>, the industry-standard toolset for automated attack-surface discovery, DNS enumeration, and external asset mapping. This hands-on course teaches you how to gather subdomains, map relationships between assets, perform passive and active DNS reconnaissance, and turn raw findings into prioritized security intelligence. Ideal for penetration testers, red teamers, bug bounty hunters, and security engineers who need scalable reconnaissance workflows.</p><p>The course emphasizes <strong>ethical, permissioned testing</strong> and safe use of recon tooling.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/amass-advanced-attack-surface-mapping-dns-reconnaissance</guid>
                <pubDate>Thu, 13 Nov 2025 11:56:16 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/wqokxpqd-400x400.jpg"
                    length="21432"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[Metasploit Framework – Exploitation &amp; Post-Exploitation Mastery]]></title>
                <link>https://mrityunjaysingh.com/products/metasploit-framework-exploitation-post-exploitation-mastery</link>
                <description><![CDATA[<p>Learn the <strong>Metasploit Framework</strong>, the industry-standard open-source exploitation platform used by penetration testers and red-teamers worldwide. This hands-on course walks you through exploitation theory, building and customizing exploits, payloads, and post-exploitation workflows — plus how to use Metasploit safely and ethically to improve defensive security. Emphasis on responsible testing, lab-controlled environments, and clear reporting.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/metasploit-framework-exploitation-post-exploitation-mastery</guid>
                <pubDate>Thu, 13 Nov 2025 11:54:03 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/workday-8-2389033369130907-l.jpg"
                    length="27878"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[SQLMap – Automated SQL Injection &amp; Database Security Mastery]]></title>
                <link>https://mrityunjaysingh.com/products/sqlmap-automated-sql-injection-database-security-mastery</link>
                <description><![CDATA[<p>Master <strong>SQLMap</strong>, the powerful open-source tool for detecting and exploiting SQL injection vulnerabilities. This hands-on course teaches you how SQL injection works, how to use SQLMap to discover and exploit weaknesses safely, and—most importantly—how to defend applications and databases from these attacks. Designed for security testers, bug bounty hunters, and developers who want deeper database security knowledge.</p><p><strong>Important:</strong> course emphasizes <strong>ethical, legal</strong> use — only test systems you own or have explicit permission to test.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/sqlmap-automated-sql-injection-database-security-mastery</guid>
                <pubDate>Thu, 13 Nov 2025 11:50:20 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/61qoa35egml-uf10001000-ql80.jpg"
                    length="41591"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[OWASP ZAP – Web Application Security Testing for Beginners &amp; Professionals]]></title>
                <link>https://mrityunjaysingh.com/products/owasp-zap-web-application-security-testing-for-beginners-professionals</link>
                <description><![CDATA[<p>Learn how to identify and fix security vulnerabilities in web applications using <strong>OWASP ZAP (Zed Attack Proxy)</strong> — one of the most popular open-source web security tools maintained by the <strong>OWASP Foundation</strong>.</p><p>This hands-on course walks you through every essential feature of ZAP, from basic setup to advanced automated scans. You’ll learn how to analyze requests and responses, intercept traffic, detect vulnerabilities, and secure your own applications like a pro.</p><p>Perfect for <strong>ethical hackers, penetration testers, and developers</strong> who want to understand how attackers exploit weak points — and how to defend against them.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/owasp-zap-web-application-security-testing-for-beginners-professionals</guid>
                <pubDate>Thu, 13 Nov 2025 11:41:31 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/71xtrprcfgl-uf10001000-ql80.jpg"
                    length="62236"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[Burp Suite (Community / Professional) – Web Application Security Testing]]></title>
                <link>https://mrityunjaysingh.com/products/burp-suite-community-professional-web-application-security-testing</link>
                <description><![CDATA[<p>Master <strong>Burp Suite</strong>, the industry-standard tool for web application penetration testing. This course teaches you how to identify, exploit, and secure vulnerabilities using both <strong>Burp Suite Community</strong> and <strong>Professional</strong> editions. Whether you’re a beginner or an experienced tester, you’ll learn to perform manual and automated scans, intercept traffic, and exploit real-world vulnerabilities safely and ethically.</p><p>By the end of this course, you’ll be able to conduct end-to-end web security assessments and strengthen your expertise in ethical hacking and bug bounty programs.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/burp-suite-community-professional-web-application-security-testing</guid>
                <pubDate>Thu, 13 Nov 2025 11:36:17 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/61lpwe8sohl.jpg"
                    length="91139"
                />
                                    <category>Tools</category>
                            </item>
                    <item>
                <title><![CDATA[Nmap – Network Scanning &amp; Reconnaissance Mastery]]></title>
                <link>https://mrityunjaysingh.com/products/nmap</link>
                <description><![CDATA[<p>Learn how to discover, analyze, and secure networks using <strong>Nmap (Network Mapper)</strong> — the world’s most powerful open-source network scanning tool. This course takes you from beginner to advanced levels, covering everything from basic host discovery to advanced vulnerability detection and penetration testing automation.</p><p>By the end of this course, you’ll be able to conduct professional-grade network assessments, identify open ports and services, and strengthen your cybersecurity defense using real-world scanning techniques.</p>]]></description>
                                    <author><![CDATA[Mrityunjay Singh - Founder &amp; CEO Digital Frontier Foundation]]></author>
                                <guid>https://mrityunjaysingh.com/products/nmap</guid>
                <pubDate>Thu, 13 Nov 2025 11:24:19 +0530</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://mrityunjaysingh.com/storage/images-2-6.jpg"
                    length="6300"
                />
                                    <category>Tools</category>
                            </item>
            </channel>
</rss>
